Oracle Communications MetaSolv Solution 6.3.0

CPE Details

Oracle Communications MetaSolv Solution 6.3.0
6.3.0
2021-01-28
17h53 +00:00
2021-04-21
12h26 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:oracle:communications_metasolv_solution:6.3.0:*:*:*:*:*:*:*

Informations

Vendor

oracle

Product

communications_metasolv_solution

Version

6.3.0

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2020-11987 2021-02-23 23h00 +00:00 Apache Batik 1.13 is vulnerable to server-side request forgery, caused by improper input validation by the NodePickerPanel. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests.
8.2
Haute
CVE-2019-17566 2020-11-11 23h00 +00:00 Apache Batik is vulnerable to server-side request forgery, caused by improper input validation by the "xlink:href" attributes. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests.
7.5
Haute
CVE-2020-1945 2020-05-14 13h57 +00:00 Apache Ant 1.1 to 1.9.14 and 1.10.0 to 1.10.7 uses the default temporary directory identified by the Java system property java.io.tmpdir for several tasks and may thus leak sensitive information. The fixcrlf and replaceregexp tasks also copy files from the temporary directory back into the build tree allowing an attacker to inject modified source files into the build process.
6.3
Moyen
CVE-2019-10086 2019-08-20 18h10 +00:00 In Apache Commons Beanutils 1.9.2, a special BeanIntrospector class was added which allows suppressing the ability for an attacker to access the classloader via the class property available on all Java objects. We, however were not using this by default characteristic of the PropertyUtilsBean.
7.3
Haute
CVE-2018-8013 2018-05-24 16h00 +00:00 In Apache Batik 1.x before 1.10, when deserializing subclass of `AbstractDocument`, the class takes a string from the inputStream as the class name which then use it to call the no-arg constructor of the class. Fix was to check the class type before calling newInstance in deserialization.
9.8
Critique